{"id":18580,"date":"2023-12-01T12:14:10","date_gmt":"2023-12-01T12:14:10","guid":{"rendered":"https:\/\/afreeurl.com\/?p=18580"},"modified":"2023-12-01T12:14:11","modified_gmt":"2023-12-01T12:14:11","slug":"leading-law-firm-and-legal-departments-for-cyber-attacks","status":"publish","type":"post","link":"https:\/\/afreeurl.com\/?p=18580","title":{"rendered":"Leading law firm and legal departments for cyber attacks"},"content":{"rendered":"<p><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Cyberattackers are doubling down on their attacks on law firms and corporate legal departments, moving beyond their historic activity of hacking and leaking secrets to target the industry with financial attacks such as ransomware and mail compromise electronic business (BEC).<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">On November 24, managed services provider CTS, which provides IT services to law firms, acknowledged that the firm <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a href=\"https:\/\/cts.co.uk\/hub\/news\/update-on-service-outage\/\" target=\"_blank\" class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" rel=\"noopener\">had suffered a breach<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, but did not give details about the origin of the attack.  The incident has <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a href=\"https:\/\/www.bbc.com\/news\/business-67543838\" target=\"_blank\" class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" rel=\"noopener\">the allegedly affected services<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">    to dozens of law firms, especially in the real estate sector.  The attack follows claims by the LockBit group that it compromised London-based law firm Allen &#038; Overy, listing the company as victims on its data breach site and demanding a ransom.  the signature <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a href=\"https:\/\/www.allenovery.com\/en-gb\/global\/news-and-insights\/news\/allen-overy-responds-to-data-incident\" target=\"_blank\" class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" rel=\"noopener\">confirmed a breach<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">but failed to recognize the ransomware attack.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The attacks are just the latest to target law firms and legal departments.  At least one attack group has specifically targeted law firms, seeding compromised sites with legal jargon to push the sites up in search rankings and then delivering a ransomware attack chain to visitors, says Keegan Keplinger , senior security researcher with managed detection and response company eSentire.  .<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;When [the targeting] it hasn&#8217;t been a legal organization, often it&#8217;s been the legal department or a legal user (a paralegal or a legal consultant) of an organization,&#8221; he says. &#8220;We saw a hospital get hit once, but it was the user legal in that hospital that was discharged [the malware].&#8221;<\/span><\/p>\n<p class=\"ContentImage-Link\">GootLoader, which leads to the Blackcat ransomware, has been heavily targeted at law firms.  Source: eSentire<\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Hackers have long favored law firms as a way to steal secrets, making off with the personal information of Uber drivers. <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">from the law firm Genova Burns LLC<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">    in January;  data hijacking of contracts and personal emails of 200 high-profile celebrities: <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">including Lady Gaga, Madonna and Rod Stewart<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">    \u2014 from New York law firm Grubman Shire Meiselas &#038; Sacks in 2020;  i <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">allegedly leaking the &#8220;Panama Papers&#8221;<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">    \u2014 11.5 million documents on wealthy tax evaders \u2014 from Panama-based law firm Mossack Fonseca.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Traditionally, the lure for online attackers hasn&#8217;t been money, says Ilia Kolochenko, chief architect at application security firm ImmuniWeb.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;Law firms are quite far from being attractive targets for cybercriminals,&#8221; he says.  &#8220;However, their clients\u2014that is, their clients&#8217; secrets\u2014make law firms a magnet for all kinds of cybercriminals.&#8221;<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\">Clickbait becomes SEO poisoning<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">This has changed, as cyber criminals more and more <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">focus on law firms as a way to make a profit<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">    with ransomware and BEC attacks.  According to <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a href=\"https:\/\/www.americanbar.org\/groups\/law_practice\/resources\/tech-report\/2022\/cybersecurity\/\" target=\"_blank\" class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" rel=\"noopener\">American Bar Association Annual Cyber \u200b\u200bSecurity Report<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, which emphasizes that a security breach is not as serious a classification as a data breach.  The legal sector is the fourth most targeted sector by cybercriminals, behind service, manufacturing and financial firms, according to eSentire data.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The most significant threat to law firms may be GootLoader, a browser-based threat that is delivered through search engine optimization (SEO) poisoning.  The group behind GootLoader has seeded malicious content and malicious advertising linked to 3.5 million search terms, a high percentage of which are legal terms.  As a result, a lawyer or paralegal searching for specific content may find the top search result leading to a file infected by GootLoader.  Downloading and opening the file will run the program, which almost always leads to <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">BlackCat Ransomware<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">says Joe Stewart, Principal Security Researcher at eSentire.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;This [is] what I call a land mine approach,\u201d he says. open  stand up, say, &#8220;What&#8217;s that? Oh, I&#8217;ll click on that JavaScript. No problem.'&#8221;<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Ransomware is not the only concern for law firms.  Several threat groups also target law firms with BEC scams.  Law firms are the perfect victims of these schemes, says Dan Caplin, director of cybersecurity and incident response at S-RM, a cybersecurity consultancy.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;Firstly, they do a lot of business by email and secondly, law firms are often in a privileged position in situations where instructions and payment details are exchanged &#8211; this, again, is mainly done by post electronic,&#8221; he says.  &#8220;This makes taking over the email account, intercepting a thread about a legitimate payment, and diverting funds to a fraudulent bank account a really effective approach.&#8221;<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\">it will get worse before it gets better<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Because law firms tend to be smaller, often just one or two people, cybersecurity knowledge is often lacking, says ImmuniWeb&#8217;s Kolochenko.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;Solo practitioners and small law firms are often poorly protected, with very modest budgets for cyber security,&#8221; he says.  \u201cLarge law firms, however, are spending more and more on cyber security and cyber defense. [but most firms] have similar problems to all other industries, including shadow computing, working from home, [and] underprotected third parties&#8221;.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Unfortunately, law firms are often tasked with guarding extremely sensitive information, making any breach a problem and making the company more likely to pay a ransom.  It&#8217;s no surprise that GootLoader has targeted the industry, says eSentire&#8217;s Keplinger.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">&#8220;For a number of reasons, law firms are a bit behind the curve in security,&#8221; he says.  &#8220;With ransomware, especially the double whammy (both stealing and encrypting the data), legal firms are an obvious organization that would be vulnerable to that, especially, that would worry about releasing their data.&#8221;<\/span><\/p>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/law-firms-face-a-more-dangerous-threat-landscape\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattackers are doubling down on their attacks on law firms and corporate legal departments, moving beyond their historic activity of hacking and leaking secrets to target the industry with financial attacks such as ransomware and mail compromise electronic business (BEC). On November 24, managed services provider CTS, which provides IT services to law firms, acknowledged that the firm had suffered a breach, but did not give details about the origin of the attack. The incident&#8230; <\/p>\n","protected":false},"author":1,"featured_media":18581,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seo-news"],"_links":{"self":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/18580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18580"}],"version-history":[{"count":1,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/18580\/revisions"}],"predecessor-version":[{"id":18582,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/18580\/revisions\/18582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/media\/18581"}],"wp:attachment":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}